scispace - formally typeset
J

Jin Li

Researcher at Sun Yat-sen University

Publications -  14
Citations -  391

Jin Li is an academic researcher from Sun Yat-sen University. The author has contributed to research in topics: Ring signature & Digital signature. The author has an hindex of 8, co-authored 14 publications receiving 375 citations. Previous affiliations of Jin Li include KAIST & The Chinese University of Hong Kong.

Papers
More filters
Journal ArticleDOI

Hidden attribute-based signatures without anonymity revocation

Jin Li, +1 more
- 01 May 2010 - 
TL;DR: Two constructions of hidden attribute-based signature from pairings are proposed, one of which supports a large universe of attributes and its security proof relies on the random oracle assumption, which can be removed in the second construction.
Posted Content

Attribute-Based Ring Signatures.

TL;DR: In this paper, the authors proposed attribute-based ring signature, which allows the signer to sign message with its attributes from attribute center and the identity of signer is kept anonymous in this ring.
Book ChapterDOI

A new hierarchical ID-Based cryptosystem and CCA-Secure PKE

TL;DR: A new hierarchical Identity based (ID-based) cryptosystem is proposed, including hierarchical identity based encryption (HIBE) and signature (HIBS) schemes, which can be proved to be secure without relying on the random oracle model.
Book ChapterDOI

Universal designated verifier ring signature (proof) without random oracles

TL;DR: This paper first introduces the concept of universal designated verifier ring signature (UDVRS), which not only allows members of a group to sign messages on behalf of the group without revealing their identities, but also allows any holder of the signature (not necessary the signer) to designate the signature to any designated verifiers.
Book ChapterDOI

Aggregate proxy signature and verifiably encrypted proxy signature

TL;DR: In this paper, the concept of aggregate proxy signature (APS) is first proposed to compact the proxy signatures and a concrete APS scheme is constructed, which can be proved to be secure under the security model of APS.